Google Says Paid Out $550,000 to Android computer virus Researchers in 2016; will increase Payout

Google Says Paid Out $550,000 to Android Bug Researchers in 2016; Increases Payout

Google delivered Android to its Vulnerability Rewards software a 12 months ago. this system basically asks researchers and builders for filing bugs in its services and products, and in return Google will pay them in cash for applicable high high-quality reports. Google now says it paid as lots as $550,000 (kind of Rs. 36,896,464) to 82 researchers for submitting diverse Android safety insects, and is seeking to increase the amount going ahead.

Google has announced that it is going to be paying greater to the researchers from June 1 for submitting vulnerabilities. The tech large pays 33 percentage more for 86f68e4d402306ad3cd330d005134dac vulnerability reviews with evidence of concept, and give extra 50 percent extra if it’s miles submitted with a CTS take a look at or a patch. The Android Vulnerability Rewards software is likewise known as the Android protection Rewards programme.

furthermore, reward for proximal kernel exploit has gone up from $20,000 (roughly Rs. thirteen,forty one,000) to $30,000 (more or less Rs. 20,12,000), and pinnacle rewards for exploiting TrustZone and proven Boot will boom from $30,000 (kind of Rs. 20,12,000) to $50,000 (roughly Rs. 33,50,00).

Google received as many as 250 vulnerability reviews last year, out of which 25 percentage had been obtained in code that changed into advanced and used out of doors of the Android Open source undertaking. furthermore, Product supervisor of Android security, Quan To found out in the blog put up, “extra than a third of them were suggested in Media Server which has been hardened in Android N to make it extra proof against vulnerabilities.”

the very best quantity become received by means of Peter Pi, who submitted a complete 26 insects, and cashed in round $75,750. 15 other researchers were given as a minimum $10,000 for filing varied vulnerabilities. interestingly, the pinnacle prize for exploiting a TrustZone and validated Boot compromise remains unclaimed.